Results 61 to 70 of about 4,920 (187)

Provable security signcryption scheme based on RLWE without trapdoor

open access: yesTongxin xuebao, 2020
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU   +3 more
doaj   +2 more sources

Badly approximable grids and k$k$‐divergent lattices

open access: yesMathematika, Volume 70, Issue 3, July 2024.
Abstract Let A∈Matm×n(R)$A\in \operatorname{Mat}_{m\times n}(\mathbb {R})$ be a matrix. In this paper, we investigate the set BadA⊂Tm$\operatorname{Bad}_A\subset \mathbb {T}^m$ of badly approximable targets for A$A$, where Tm$\mathbb {T}^m$ is the m$m$‐torus. It is well known that BadA$\operatorname{Bad}_A$ is a winning set for Schmidt's game and hence
Nikolay Moshchevitin   +2 more
wiley   +1 more source

Multi‐hop anonymous payment channel network based on onion routing

open access: yesIET Blockchain, Volume 4, Issue 2, Page 197-208, June 2024.
To solve the payment channel network path privacy problem, we analyse the multi‐hop anonymous and privacy‐preserving payment channel network scheme and propose a multi‐hop anonymous payment channel network based on onion routing based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing‐based payment ...
Caimei Wang, Yudong Ren, Zhize Wu
wiley   +1 more source

Preimage Attacks on Reduced Tiger and SHA-2 [PDF]

open access: yes, 2009
This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel presented a preimage attack on Tiger reduced to 13 rounds (out of 24) with a complexity of 2128.5. Our new preimage attack finds a one-block preimage of Tiger reduced to 16 rounds with a complexity of 2161. The proposed attack is based on meet-in-the-middle attacks.
Takanori Isobe, Kyoji Shibutani
openaire   +1 more source

Picard sheaves, local Brauer groups, and topological modular forms

open access: yesJournal of Topology, Volume 17, Issue 2, June 2024.
Abstract We develop tools to analyze and compare the Brauer groups of spectra such as periodic complex and real K$K$‐theory and topological modular forms, as well as the derived moduli stack of elliptic curves. In particular, we prove that the Brauer group of TMF$\mathrm{TMF}$ is isomorphic to the Brauer group of the derived moduli stack of elliptic ...
Benjamin Antieau   +2 more
wiley   +1 more source

A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain

open access: yesIEEE Access, 2018
Nowadays, blockchain has become one of the most cutting-edge technologies, which has been widely concerned and researched. However, the quantum computing attack seriously threatens the security of blockchain, and related research is still less. Targeting
Yu-Long Gao   +5 more
doaj   +1 more source

Concurrent Knowledge-Extraction in the Public-Key Model [PDF]

open access: yes, 2009
Knowledge extraction is a fundamental notion, modelling machine possession of values (witnesses) in a computational complexity sense. The notion provides an essential tool for cryptographic protocol design and analysis, enabling one to argue about the ...
Yao, Andrew C., Yung, Moti, Zhao, Yunlei
core   +2 more sources

International Consensus Statement on Allergy and Rhinology: Sinonasal Tumors

open access: yesInternational Forum of Allergy &Rhinology, Volume 14, Issue 2, Page 149-608, February 2024.
Abstract Background Sinonasal neoplasms, whether benign and malignant, pose a significant challenge to clinicians and represent a model area for multidisciplinary collaboration in order to optimize patient care. The International Consensus Statement on Allergy and Rhinology: Sinonasal Tumors (ICSNT) aims to summarize the best available evidence and ...
Edward C. Kuan   +158 more
wiley   +1 more source

Partial pre-image attack on Proof-of-Work based blockchains

open access: yesBlockchain: Research and Applications
Blockchain is a type of distributed ledger technology that consists of a growing list of records, called blocks, that are securely linked together using cryptography.
Hamza Baniata, Attila Kertesz
doaj   +1 more source

Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy